Full Project – Design and implementation of a computerized biological verification system for crime control

Full Project – Design and implementation of a computerized biological verification system for crime control

Click here to Get this Complete Project Chapter 1-5

CHAPTER ONE

INTRODUCTION

  • INTRODUCTION

The traditional and age-old system of intelligence and criminal record maintenance has failed to live up to the requirements of the existing crime scenario. Manual processes neither provide accurate, reliable and comprehensive data round the clock nor does it help in trend prediction and decision support. It also results in lower productivity and ineffective utilization of manpower. The solution to this ever-increasing problem lies in the effective use of Information Technology. Computerized Biological Verification System for crime control uses computer-generated records as an interface for integrating and accessing massive amounts of location-based information.

Verification which is the process of establishing the truth, accuracy, or validity of something, we often get verified  on having  access to bank accounts, entering a protected site, logging into a computer and in police station base on crime Unfortunately, passport, keys, access cards and Personal Identification Numbers (PINs) can easily be forgotten, compromised, shared or observed. Such deficiencies of conventional personal identification techniques have caused major problems to all concerned. For example, hackers often disrupt computer networks, credit card fraud is estimated at billions dollars per year worldwide. Therefore, robust, reliable and foolproof personal identification solutions must be sought in order to address the deficiencies of the conventional techniques, something that could verify that someone is physically the person he/she claims to be. A biological verification system is a unique, measurable characteristic or trait of a human being for automatically recognized or verifying identity.

Crime tracking system allows police personnel to plan effectively for emergency response, determine mitigation priorities, analyze historical events, and predict future events. Crime tracking system helps identify potential suspects to increase investigators suspect base when no leads are evident. The ability to access and process information quickly while displaying it in a spatial and visual medium allows agencies to allocate resources quickly and more effectively. In the ‘mission-critical’ nature of law enforcement, information about the location of a crime, incident, suspect, or victim is often crucial to determine the manner and size of the response. Crime tracking software helps co-ordinate vast amounts of location-based data from multiple sources. It enables the user to layer the data and view the data most critical to the particular issue or mission. It is used world over by police departments, both large and small, to provide solutions for crime analysis, criminal tracking, traffic safety, community policing, Intranet/Internet mapping, and numerous other tasks.
Crime tracking system helps crime officers determine potential crime sites by examining complex seemingly unrelated criteria and displaying them all in an interface. It also helps them map inmate populations, fixtures, and equipment to provide for the safety of inmates by separating gang members, identifying high-risk or potentially violent inmates, and identifying hazardous locations in an area. It reduces the potential for internal violence by providing better command and control. Traditionally, these activities have been supported by paper and pen. Police officers now have the ability to immediately generate crime report directly relevant to the situation at hand. Police agencies collect vast amounts of data from many sources including called-for-services, arrests, first information reports and daily report. The same information provides a powerful decision making tool for investigators, supervisors, and administrators.

In this chapter, the study will be discussing the following sub headings; the background of study, statement of the problem, the aim and objectives of the study, significance, scope and limitations of the study as well as the definitions of technical terminologies used in the study.

 

1.2 BACKGROUND OF STUDY

Crime which is an offence that merits community condemnation and punishment, usually by way of fine or imprisonment. This is different from a civil wrong (a tort), which is an action against an individual that requires compensation or restitution. Criminal offences are normally prosecuted by the State or the Commonwealth, whereas it is usually up to an individual to take a civil action to court. It is also possible for an individual to begin criminal proceedings, but this is very rare. Some matters, such as assault, can be both crimes and civil wrongs at the same time. The police can prosecute for assault and the victim can take civil action to recover money (or some other kind of compensation) for any injury suffered.

Personal identification is ever present in our daily lives. For example we often have to prove our identity for getting access to bank accounts, entering a protected site, withdrawing cashing from an ATM machine, logging into a computer, and so on. Conventionally, we identity ourselves and gain access by physically carrying passports, keys, access cards or by remembering passwords, secret codes, and Personal Identification numbers (PINs). Unfortunately, passport, keys, access cards can be lost, duplicated, stolen, or forgotten; and password, secret codes and Personal Identification Numbers (PINs) can easily be forgotten, compromised, shared or observed. Such deficiencies of conventional personal identification techniques have caused major problems to all concerned. For example, hackers often disrupt computer networks, credit card fraud is estimated at billions dollars per year worldwide. Therefore, robust, reliable and foolproof personal identification solutions must be sought in order to address the deficiencies of the conventional techniques, something that could verify that someone is physically the person he/she claims to be. A biological verification system is a unique, measurable characteristic or trait of a human being for automatically recognized or verifying identity. By using a biological identification, the individual verification can be done by doing the statistical analysis of biological characteristic. This measurable characteristic can be physical, e.g. eye, face, finger image and hand, or behavioral, e.g. signature and typing rhythm. Besides bolstering security, the systems also enhance user convenience by alleviating the need to design and remember multiple complex passwords.

In spite of the fact that automatic recognition systems based on fingerprints have been used by law enforcement agencies worldwide for over 40years, biological recognition continues to remain a very difficult pattern of recognition problem. Therefore, a proper system design is needed to verify a person quickly and automatically (Uludag et al 2004). In this project, a biological system is proposed for human verification i.e. authenticating the identity of an individual. The software uses human features for verification process. Biological verification system authorizes humans. It covers issues such as how users are given an identity, the protection of that identity and the technologies supporting that protection, the term identity is a more abstract concept that will always be difficult to define in way that satisfies everyone. It is a concept that is fluid and contextual depending on a number of factors including culture. Thus the term management is appended to “identity” to indicate that there is technological and best practice framework around a somewhat intractable philosophical concept. Digital identity can be interpreted as the codification of identity names and attributes of a physical instance in a way that facilitates processing. In each organization there is normally a role or department that is responsible for managing the scheme of digital identities of their staff and their own objects. These represented by object identities or object identifiers.

Historically, fingerprints have been used as the most authoritative method of authentication, but recent court cases in the US and elsewhere have raised fundamental doubt about fingerprint reliability. Outside of the legal system as well, fingerprint have been shown to be easily spoof able, with British Telecom’s top computer-security official noting that “few” fingerprint readers have not already been tricked by one spoof or another Hybrid or two-tired authentication methods offers a compelling solution, such as private keys encrypted by fingerprint inside of a USB device. In a computer data context, cryptographic methods have been developed which are currently not spoof able if and only if the originator’s key has not been compromised. That the originator (or anyone other than an attacker) knows (or doesn’t know) about a compromise is irrelevant. It is not known whether these cryptographically based authentication methods are provably secure since unanticipated mathematical development may make them vulnerable to attack in future. If that were to occur, it may call into question much of the authentication in the past. In particular, a digitally signed contract may be questioned when a new attack and the cryptography underlying the signature is discovered.

Imo State Police command is saddled with the responsibility of eradicating crime, protecting life/property of the masses, inculcating good moral standards, and enforcement of law. Statistics shows that the commission receives approximately two hundred to three hundred suspects per day ranging from rape, cybercrime, Arm rubbery, Murder and etc.  These criminals are been arraigned/prosecuted at the station or awaiting trials. These have posed a lot of stress/challenges to the police officers   due to the manual method of verifying criminals on the other hand. Further investigation shows that sometimes   the suspects stay all day/months without been tried or verified, for instance whenever a suspect/ex-convict is arraigned in the custody for trial the commission starts afresh to try the  suspect again  which is more  tedious. What constitutes these problems are; lack of automated system for verification, limited man power, and poor knowledge of crime investigation.

It is against this background that the researcher decided to embark on this study with the aim of designing biological verification system that can be used to reduce identified challenges in the existing system.

The new system will provide a medium whereby  statistical analysis of biological characteristic can be used to detect a criminal,  this measurable characteristic can be physical, e.g. eye, face, finger image and hand, or behavioral, e.g. signature and typing rhythm. Besides bolstering security, the systems also enhance user convenience by alleviating the need to design and remember multiple complex features.

1.3STATEMENTS OF PROBLEM

Problems encountered in the existing system are as follows:

  1. In the existing system the command officers pass through stress in process of crime verification.
  2. The manual process of crime verification in the existing system is prone to time wastage
  3. In the existing system there is Poor storage of data in times of retrieving a suspect information

1.4. AIM AND SPECIFIC OBJECTIVES OF STUDY

The main aim of this study the Design and Implementation of Biological Verification System for Imo state police command. In achieving this aim the following specific objectives will be accomplished through the design of a system

  1. Reduce the amount of stress the command officers  pass through during crime verification
  2. To ensure speed and accurate crime verification by using characteristic can be physical, e.g. eye, face, finger image  for verification
  1. To Ensure easy retrieval of criminal  record in case of loss of data

1.5 SIGNIFICANCE OF STUDY

The new system when completed and implemented will enable the commission and similar organization to improve in their mode of operation in terms of security. Besides, the study will serve as a reference material to subsequent researchers in related topics.

1.6 SCOPE OF STUDY

This research will only concentrate on using behavioral characteristics   in crime verification for Imo state police command

1.7 LIMITATIONS OF THE STUDY

In the course of the project work, certain constraints restrained the researcher from achieving the set out objectives;

Time constraint: Due to tedious academic activities like practical, assignment submission/ defense and exam preparation, the researcher was unable to complete the project requirement process.

Inadequate funds:  Due to inadequate funds, the researcher was unable to purchase the sublime editor which could be used to make the programming process faster; therefore the researcher bought a cheaper editor which delayed the programming process

1.8 DEFINITION OF TERMS

For easier understanding of unfamiliar words used in the research work, their meanings are as follows;

CCTV: Closed Circuit Television, a system used for broadcasting TV signals captured from security cameras

CRIME: an action prohibited by law or a failure to act as required by law

DN: A nucleic acid molecule in the form of a twisted double strand double helix that is the major component of chromosomes and carries genetic information.

FORENSICS – is the application of a broad spectrum of sciences and technologies to investigate and establish facts of interest in relation to criminal of civil law.

INVESTIGATION:  an examination or inquiry into something, especially a detailed one that is undertaken officially, or the act of undertaking an examination.

POLICE: a civil organization whose members are given special legal powers by the government and whose task is to maintain public order and to solve and prevent crimes

RISK: a risk is a possible event which could cause a loss.

SECURITY: security is the condition of being protected against or loss

SURVEILANCE: continual observation of a person or group, especially one suspected of doing something illegal

THREAT: threat is a method of triggering a risk event that is dangerous.

VULNERABILITY: a weakness in a target that can potentially

 

Get the Complete Project

This is a premium project material and the complete research project plus questionnaires and references can be gotten at an affordable rate of N3,000 for Nigerian clients and $8 for international clients.

Click here to Get this Complete Project Chapter 1-5

 

 

 

 

 

You can also check other Research Project here:

  1. Accounting Research Project
  2. Adult Education
  3. Agricultural Science
  4. Banking & Finance
  5. Biblical Theology & CRS
  6. Biblical Theology and CRS
  7. Biology Education
  8. Business Administration
  9. Computer Engineering Project
  10. Computer Science 2
  11. Criminology Research Project
  12. Early Childhood Education
  13. Economic Education
  14. Education Research Project
  15. Educational Administration and Planning Research Project
  16. English
  17. English Education
  18. Entrepreneurship
  19. Environmental Sciences Research Project
  20. Guidance and Counselling Research Project
  21. History Education
  22. Human Kinetics and Health Education
  23. Management
  24. Maritime and Transportation
  25. Marketing
  26. Marketing Research Project 2
  27. Mass Communication
  28. Mathematics Education
  29. Medical Biochemistry Project
  30. Organizational Behaviour

32    Other Projects pdf doc

  1. Political Science
  2. Psychology
  3. Public Administration
  4. Public Health Research Project
  5. More Research Project
  6. Transportation Management
  7. Nursing

Education

Essay 

 

 

Full Project – Design and implementation of a computerized biological verification system for crime control